Cloud CISO Perspectives: New Threat Horizons details evolving risks — and defenses

Source

Welcome to the first Cloud CISO Perspectives for August 2025. Today, our Office of the CISO’s Bob Mechler and Anton Chuvakin dive into the key trends and evolving threats that we tracked in our just-published Cloud Threat Horizons report. As with all Cloud CISO Perspectives, the contents of …

Law and water: Russia blamed for US court system break-in and Norwegian dam drama

Source

Moscow-linked miscreants accused of swiping sealed US court files and fiddling with a Norwegian dam’s floodgates Russian attackers reportedly spent months rummaging through the US federal court's creaky case-management system, while Norway reckons the same Kremlin-friendly miscreants took control of a dam's controls – a transatlantic double-act in legal …

177 AWS services achieve HITRUST certification

Source

Amazon Web Services (AWS) is excited to announce that 177 AWS services have achieved HITRUST certification for the 2025 assessment cycle, including the following five services which were certified for the first time: Amazon Verified Permissions AWS B2B Data Interchange AWS Payment Cryptography AWS Resource Explorer AWS Security Incident …

Secure chat darling Matrix admits pair of 'high severity' protocol flaws need painful fixes

Source

Foundation warns federated servers face biggest risk, but single-instance users can take their time Updated The maintainers of the federated secure chat protocol Matrix are warning users of a pair of "high severity protocol vulnerabilities," addressed in the latest version, saying patching them requires a breaking change in servers …

Microsoft Patch Tuesday, August 2025 Edition

Source

Microsoft today released updates to fix more than 100 security flaws in its Windows operating systems and other software. At least 13 of the bugs received Microsoft’s most-dire “critical” rating, meaning they could be abused by malware or malcontents to gain remote access to a Windows system with …

Forrester study: Customers cite 240% ROI with Google Security Operations

Source

As part of Google Cloud’s fundamental belief that robust security can enable business resilience and innovation, we're committed to empowering security operations teams with solutions that deliver measurable value and demonstrable return on investment (ROI). That's why we're thrilled to announce a new, in-depth Forrester Consulting Total Economic …

High-severity WinRAR 0-day exploited for weeks by 2 groups

Source

A high-severity zero-day in the widely used WinRAR file compressor is under active exploitation by two Russian cybercrime groups. The attacks backdoor computers that open malicious archives attached to phishing messages, some of which are personalized. Security firm ESET said Monday that it first detected the attacks on July …

« newer articles | page 17 | older articles »